EMNE | Cybertrusler & Angreb

De digitale trusler udvikler sig hastigt, og cyberangreb bliver både mere målrettede og sofistikerede.

Temaet stiller skarpt på de aktuelle trusselsbilleder fra ransomware og phishing til statssponsorerede angreb og præsenterer de nyeste metoder til detektion, forebyggelse og respons.

Fokus er både på teknologi og menneskelig faktor.

onsdag den 6. maj 2026
Sådan løfter AI jeres cyberforsvar09.30 - 10.00Sal 1
The new frontier of cyber threats09.45 - 10.15Cyber Innovation Stage
Exposure Management in a Changing World - Navigating Uncertainty and Volatility09.45 - 10.15Theater 10
Assume breach, prepare for recovery: why data resilience is mandatory for business survival09.45 - 10.15Sal 3
Beyond the Acronyms: A Practical Framework for Securing Enterprise AI10.15 - 10.45Sal 8
How to deal with Agentic AI in a Zero Trust ecosystem10.15 - 10.45Sal 4
Guided Tour | People and Identity - The Most Critical Factor in Cybersecurity10.30 - 11.00Guidede ture mødested
TDC Erhverv Cyber Threat Intelligence - Et nationalt indblik10.30 - 11.00Sal 2
Det aktuelle trusselsbillede for danske virksomheder i 202610.30 - 11.00Sal 3
Undgå det komplekse netværks kollaps: Hvorfor mindre kompleksitet giver mere sikkerhed10.30 - 11.00Sal 6
The Invisible Insider: When AI Has Autonomy11.00 - 11.30Sal 5
From signals to stories: Don't just go with the (net)flow11.00 - 11.30Sal 8
Cyber Resilience at Speed and Scale with FIDO Pre-Reg11.15 - 11.45Sal 6
Den moderne arbejdsplads uden grænser: Centraliseret kontrol og Zero Trust med Chrome Enterprise11.15 - 11.45Sal 3
The Proactive Pivot: How Operational Threat Intelligence and Exposure Management Defeat AI Scaled Attacks11.15 - 11.45Theater 10
Guided Tour | When the Attack Happens - Detecting and Responding to Modern Cyber Threats11.30 - 12.30Guidede ture mødested
Exposure Management: How to quickly identify and reduce real risk11.45 - 12.15Sal 1
Gør backup til en aktiv del af din sikkerhedsstrategi11.45 - 12.15Sal 5
Mennesket som angrebsflade – fra phishing til CEO-fraud og deepfakes12.00 - 12.30Sal 6
Cisco Cybersecurity Customer Case: Samsøe Samsøe12.30 - 13.00Sal 1
Guided Tour | Securing Cloud and Hybrid IT - Control Without Slowing the Business12.30 - 13.00Guidede ture mødested
When reality lies: Deepfakes and the Evolution of Phishing APT12.30 - 13.00Theater 9
Reaction to Readiness: Practical Resilience Strategies in an era of Geopolitical Uncertainty12.30 - 13.00Sal 5
Keepit: When the Cloud Goes Dark — Resilience Lessons from Hybrid Threats12.30 - 13.00Sal 8
It trusselsbilledet anno 202612.45 - 13.15Sal 6
Europe First: Fremtidssikret informationssikkerhed i en ustabil verden12.45 - 13.15Sal 3
The AI Ecosystem from Bots to Hackers12.45 - 13.15Sal 2
Katten efter musen12.45 - 13.30Theater 10
Stop med kun at tale om sikkerhed – her er de konkrete greb, der skaber handling13.15 - 13.45Sal 8
Securing Every Identity: Humans, Machines, and AI13.15 - 13.45Sal 5
Fra Trusler til Træthed, fra Fatigue til Fokus13.15 - 13.45Sal 4
Beyond the Perimeter: The New Identity Mandate13.15 - 13.45Sal 1
CEO vs Hacker - Lektioner fra Dark Web13.15 - 13.45Theater 9
Hybrid Mesh Firewalls – Gartner Buzzword eller nødvendig ændring i arkitekturen?13.30 - 14.00Theater 10
Why Business Resilience Requires an End‑to‑End Mindset13.30 - 14.00Sal 6
Closing the Identity Blind Spots Across Humans, Machines, and AI13.30 - 14.00Sal 2
En scanner viser potentielle huller. En angriber finder veje. Vi viser dig forskellen.13.30 - 14.00Sal 3
Guided Tour | Secure Operations, OT and Infrastructure - Cybersecurity in Everyday Practice13.30 - 14.00Guidede ture mødested
Breaking Down Europe’s Threat Landscape14.00 - 14.30Theater 9
Beyond the Chatbot: Engineering Agentic Workflows for the Modern SOC14.00 - 14.30Sal 1
AI workload fundamentals & the new traffic pattern14.00 - 14.30Sal 8
2026 State of Security14.00 - 14.30Sal 4
From Exposure to Exploitation: A Data-Driven Look at Danish Cyber Threats14.15 - 14.45Sal 6
Data Security & AI Data Governance — Creating an Experience Worth Trusting14.15 - 14.45Sal 3
Guided Tour | Compliance, NIS2 and Risk Management - Turning Requirements into Business Value14.30 - 15.00Guidede ture mødested
Ransomware resilience14.45 - 15.15Sal 5
The Application-First Path to Zero Trust14.45 - 15.15Sal 8
Preemptive Security as a foundational cyber defense control14.45 - 15.15Sal 4
Trusselsbilledet 2026: Fra helikopterperspektiv til hverdagens beslutninger15.00 - 15.30Sal 6
TBD - Good AI vs. Bad AI: Outwitting Adversaries with AI-Native Cybersecurity15.00 - 15.30Sal 7
Beyond the Checklist: Unifying IT, IoT, and OT to Future-Proof Your Cyber Resilience15.30 - 16.00Sal 4
The New Perimeter: Securing Against the New Era of Autonomous Threats15.30 - 16.00Sal 8
The Outside-In Advantage: Modernising TPRM with AI and Threat Intelligence15.30 - 16.00Sal 5
Quiztime: "The Cyber Clash" - Ingeniørens store sikkerhedsquiz15.30 - 16.05V2 Stage
Reporting Active Exploits in 24 Hours: Are You Ready for the CRA?15.45 - 16.15Sal 3
torsdag den 7. maj 2026
AI or Die: Achieving the Autonomous SOC09.45 - 10.15Sal 6
The Cyber Arena: A CTF for Curious Minds and Seasoned Hackers09.45 - 11.45Sal 2
Guided Tour | Secure Operations, OT and Infrastructure - Cybersecurity in Everyday Practice10.00 - 10.30Guidede ture mødested
Live demo: angreb vs. forsvar - følg angrebet live og se Splunk skabe fuld visibilitet10.15 - 10.45Theater 9
How to deal with Agentic AI in a Zero Trust ecosystem10.15 - 10.45Sal 4
Undgå det komplekse netværks kollaps: Hvorfor mindre kompleksitet giver mere sikkerhed10.15 - 10.45Sal 5
Det aktuelle trusselsbillede for danske virksomheder i 202610.30 - 11.00Theater 10
Think like an adversary. Beyond CTEM "Your security metrics.. might be lying to you"11.00 - 11.30Sal 4
Guided Tour | Compliance, NIS2 and Risk Management - Turning Requirements into Business Value11.00 - 11.30Guidede ture mødested
Usynlig fjende: Da cyberkrigen ramte Danmark11.00 - 11.35V2 Stage
Er jeres flåde klar til en Ransomware-fri fremtid? En praktisk guide til ChromeOS-migrering11.15 - 11.45Sal 3
Cloud Security in the AI Era: The Biggest Risks and How to Stop Them11.45 - 12.15Sal 8
Cloud Security & Visibility11.45 - 12.15Sal 5
Guided Tour | People and Identity - The Most Critical Factor in Cybersecurity12.00 - 12.30Guidede ture mødested
AI løber stærkt. Sørg for, at dine data ikke løber fra dig12.00 - 12.30Sal 7
Quantumtruslen forklaret12.45 - 13.15Sal 3
The ROI of Prevention: Mastering the Basics to Build Real Cyber Resilience12.45 - 13.15Sal 7
Breaking the Reactive Cycle: A Masterclass in Modern Cyber Security for MSPs12.45 - 13.15Sal 6
Guided Tour | When the Attack Happens - Detecting and Responding to Modern Cyber Threats13.00 - 13.30Guidede ture mødested
Guided Tour | Securing Cloud and Hybrid IT - Control Without Slowing the Business14.00 - 14.30Guidede ture mødested